Commit Graph

27376 Commits

Author SHA1 Message Date
Sebastian Huber
d006b46df3 score: Add heap statistics
Add lifetime bytes allocated and freed since they were present in the
malloc statistics.  Add number of failed allocations.
2014-11-28 13:09:11 +01:00
Sebastian Huber
2c3c657625 score: Return heap stats via _Heap_Get_information
Print out heap statistics via the MALLOC and WKSPACE shell commands.
2014-11-28 13:09:07 +01:00
Sebastian Huber
01557b0c6e libcsupport: Delete malloc statistics
Use the heap handler statistics instead.  Add heap walk option to MALLOC
shell command.

close #1367
2014-11-28 11:23:53 +01:00
Sebastian Huber
3b4ca3ab0f bdbuf: Fix race condition with sync active flag
Bug report by Oleg Kravtsov:

In rtems_bdbuf_swapout_processing() function there is the following
lines:

if (bdbuf_cache.sync_active && !transfered_buffers)
{

    rtems_id sync_requester;
    rtems_bdbuf_lock_cache ();
    ...

}

Here access to bdbuf_cache.sync_active is not protected with anything.
Imagine the following test case:

1. Task1 releases buffer(s) with bdbuf_release_modified() calls;

2. After a while swapout task starts and flushes all buffers;

3. In the end of that swapout flush we are before that part of code, and
assume there is task switching (just before "if (bdbuf_cache.sync_active
&& !transfered_buffers)");

4. Some other task (with higher priority) does bdbuf_release_modified
and rtems_bdbuf_syncdev().

This task successfully gets both locks sync and pool (in
rtems_bdbuf_syncdev() function), sets sync_active to true and starts
waiting for RTEMS_BDBUF_TRANSFER_SYNC event with only sync lock got.

5. Task switching happens again and we are again before "if
(bdbuf_cache.sync_active && !transfered_buffers)".

As the result we check sync_active and we come inside that "if"
statement.

6. The result is that we send RTEMS_BDBUF_TRANSFER_SYNC event! Though
ALL modified messages of that task are not flushed yet!

close #1485
2014-11-28 10:56:46 +01:00
Joel Sherrill
e22af784cd sync.c: Add asserts to document and check assumptions 2014-11-27 10:06:23 -06:00
Joel Sherrill
8dbbea6bcc msdos_file.c: Reverse return codes per Gedare 2014-11-27 09:29:16 -06:00
Joel Sherrill
a8b071dbd5 rtems-bin2c.c: Fix free() of altered pointer 2014-11-27 09:28:42 -06:00
Sebastian Huber
3a8566b796 bsp/qoriq: Delete empty header file
close #2062
2014-11-27 14:03:34 +01:00
Sebastian Huber
43b09a9865 shell: Make mv, cp and rm usable for applications
close #2030
2014-11-27 13:37:52 +01:00
Sebastian Huber
0ff1c29d96 smptests/smpmrsp01: Use busy waits
Use busy waits instead of sleeps to avoid unnecessary switches to the
idle thread.
2014-11-27 10:33:31 +01:00
Sebastian Huber
5bd822a779 smp: Fix scheduler helping protocol
Ensure that scheduler nodes in the SCHEDULER_HELP_ACTIVE_OWNER or
SCHEDULER_HELP_ACTIVE_RIVAL helping state are always
SCHEDULER_SMP_NODE_READY or SCHEDULER_SMP_NODE_SCHEDULED to ensure the
MrsP protocol properties.
2014-11-27 10:33:31 +01:00
Sebastian Huber
79569ae655 smp: Fix scheduler helping protocol assertions 2014-11-27 10:33:31 +01:00
Sebastian Huber
cbc433c7a2 bsps/arm: Add .nocache section
This section can be use to provide a cache coherent memory area via
rtems_cache_coherent_add_area().
2014-11-27 10:33:30 +01:00
Sebastian Huber
038faca160 rtems: Add rtems_cache_coherent_allocate()
Add rtems_cache_coherent_free() and rtems_cache_coherent_add_area().
2014-11-27 10:33:30 +01:00
Josh Oguin
b164303012 tools/build/*.c: Clean up issues reported by CodeSonar
This code is built without warnings and ignored by Coverity Scan.
CodeSonar found a wide range of issues including buffer overruns,
buffer underruns, questionable type conversions, leaks, etc. This
set of patches addresses all reported issues.
2014-11-26 07:52:00 -06:00
Josh Oguin
d4ec0a2d75 monitor/mon-prmisc.c: Use puts() not fprintf()
CodeSonar flagged this as a case where the user could inject a format
string and cause issues. Since we were not printing anything but a
string, just switching to puts() rather than fprintf(stdout,...) was
sufficient to make this code safer.
2014-11-26 07:52:00 -06:00
Josh Oguin
8b9bc54b5a objectgetnameasstring.c: Reformat _Objects_Get() switch to follow pattern 2014-11-26 07:52:00 -06:00
Josh Oguin
c562d0c9b0 objectimpl.h: Add _Assert() to _Objects_Invalidate_Id()
CodeSonar flagged this as a possible NULL deference. This should never
occur but adding the _Assert() ensures we are guarding against that.
2014-11-26 07:51:59 -06:00
Josh Oguin
fbafb8f249 chainimpl.h: Add _Assert() to _Chain_Initialize_empty()
CodeSonar flagged this as a potential NULL deference. That should never
occur but adding the _Assert() ensures we are checking that.
2014-11-26 07:51:59 -06:00
Josh Oguin
e106aa7380 cpukit/posix/src/timertsr.c: Add _Assert()
CodeSonar flagged this as an empty if body. Upon analysis, it turned
out to be an error that we think should never occur but if it did,
there is nothing we could do about it. It would likely just indicate
the thread was deleted before we got here. Adding the _Assert() at least
will flag this if it ever occurs during a debug build and we can discuss
what happened.
2014-11-26 07:51:59 -06:00
Josh Oguin
90a8e42be4 monitor/mon-editor.c: Use puts() and snprintf() not fprintf() or sprintf()
CodeSonar flagged this as a case where the user could inject a format
string and cause issues. Since we were not printing anything but a
string, just switching to puts() rather than fprintf(stdout,...) was
sufficient to make this code safer.

snprintf() places a limit on the length of the output from sprintf()
and avoids similar buffer overrun issues.
2014-11-26 07:51:59 -06:00
Josh Oguin
4862532fd9 imfs/imfs_handlers_link.c: Add _Assert for NULL pointer
CodeSonar flagged this as a possible dereference of a NULL pointer.
This should never occur so adding _Assert().
2014-11-26 07:51:59 -06:00
Josh Oguin
43d6a28fd1 dosfs/msdos_misc.c: Remove unnecessary operation
CodeSonar flagged the increment of this pointer as unneeded. The pointer
is not used past this point.
2014-11-26 07:51:58 -06:00
Josh Oguin
21c0ca8426 dosfs/msdos_file.c: Return an error if it occurs
CodeSonar flagged this as a case where the return value from fat_sync()
was not used. Now it is used to return pass/fail to the caller.
2014-11-26 07:51:58 -06:00
Josh Oguin
10f28a3af1 dosfs/msdos_conv.c: Remove unnecessary operations
These were flagged by CodeSonar. The assignments on variable declaration
are overridden a few lines below and the other line later with name_size
is where name_size was not used after this assignment.
2014-11-26 07:51:58 -06:00
Josh Oguin
72f63eeff0 libcsupport/src/newlibc_exit.c: Remove dead code
This was flagged as an empty for statement by CodeSonar but is actually
unreachable code that should be removed.
2014-11-26 07:51:58 -06:00
Josh Oguin
f18fd4f2bc libcsupport/src/mount.c: Remove unnecessary operation
This was flagged by CodeSonar.
2014-11-26 07:51:57 -06:00
Josh Oguin
aed6e1de21 libchip/serial/z85c30.c: Remove redundant assignment
This was flagged by CodeSonar.
2014-11-26 07:51:57 -06:00
Josh Oguin
02958c5e53 libchip/serial/ns16550* and z8530*: Assert on baud number to avoid divide by 0
This was flagged by CodeSonar. It should be impossible to get an
incorrect baud number back but ensure this in debug mode. The _Assert()
keeps their scanner from evaluating for divide by 0 past this point.
2014-11-26 07:51:57 -06:00
Josh Oguin
0ad1e8001f libchip/display/disp_hcms29xx.c: Remove useless variable and check
This was flagged by CodeSonar.
2014-11-26 07:51:57 -06:00
Josh Oguin
61f8d668d0 libbsp/shared/bspinit.c: Document assumption of NULL returned 2014-11-26 07:51:57 -06:00
Josh Oguin
ba3b6fdc89 apimutex.c: Add _Assert for NULL pointer access
CodeSonar detects a possible NULL deference here. But it should never
occur in tested code. Memory for the API Mutexes is reserved by confdefs.h
and are all preallocated when the class of objects is initialized.
Allocating a single instance should never fail.
2014-11-26 07:51:56 -06:00
Sebastian Huber
fdd1e20579 shell: Include missing header 2014-11-26 09:58:40 +01:00
Sebastian Huber
90b0e28456 i2c: Do not close file descriptor 0 if open fails 2014-11-26 09:56:01 +01:00
Sebastian Huber
d6f0ca64a5 i2c: Avoid undefined right shift operation 2014-11-26 08:26:15 +01:00
Jennifer Averett
39af57c3f7 smp09: Resolve missing prototype warning. 2014-11-25 14:44:59 -06:00
Jennifer Averett
6291e9627e smp07: Resolve missing prototype warning. 2014-11-25 14:44:59 -06:00
Jennifer Averett
2c474a056f smp05: Resolve missing prototype warning. 2014-11-25 14:44:59 -06:00
Jennifer Averett
441dc1c1ad smp02: Resolve unused method warnings. 2014-11-25 14:44:59 -06:00
Jennifer Averett
4375b3b660 smp03: Remove set but not used warning.
Added status validation.
2014-11-25 14:44:59 -06:00
Jennifer Averett
689cba286f smpschedsem01: Remove unused variable warning. 2014-11-25 14:44:59 -06:00
Jennifer Averett
15e371fe67 smpschedaffinity02: Remove unused prototype. 2014-11-25 14:44:59 -06:00
Joel Sherrill
505b680642 rtems-rfs-rtems.c: Add cast to address warning 2014-11-25 12:58:01 -06:00
Joel Sherrill
ebb39a216d hexdump-conv.c: Use proper printf() formatting for wchar_t 2014-11-25 12:58:00 -06:00
Joel Sherrill
3bd0cd1ad5 main_edit.c: Do not reference beyond end of array 2014-11-25 12:58:00 -06:00
Joel Sherrill
d15202490c shell/main_edit.c: Note return value not checked
Coverity Id 1255320 spotted an unchecked return value.
2014-11-25 12:57:09 -06:00
Joel Sherrill
3211e8e9c0 cpukit/libcsupport/src/pwdgrp.c: Check return value
Coverity Id 1255518. mkdir() could fail. Check return value and return
on failure. Behavior is similar to if open() failed while writing the
files.
2014-11-25 12:57:09 -06:00
Joel Sherrill
630642e21c shell/main_blksync.c: Fix leak of file descriptor
Coverity Id 1063887. File descriptor not freed on error path.
2014-11-25 12:57:09 -06:00
Joel Sherrill
4afa216ba8 cpukit/libmisc/shell/main_edit.c: Fix use after free()
Coverity Id 1255353. Read from pointer after free().
2014-11-25 12:57:08 -06:00
Joel Sherrill
a0bf44e115 cpukit/dev/i2c/i2c-dev.c: Fix leak on error path
Coverity ID 1255520. fd was not closed on error path.
2014-11-25 12:57:08 -06:00